lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <qd32erndjbtspx4im5u2ge2vgdc4qwwvxhkoaefxwzkue5x7kc@ghk5fdkma6vm>
Date: Mon, 30 Dec 2024 20:22:46 +0200
From: Dmitry Baryshkov <dmitry.baryshkov@...aro.org>
To: Srinivas Kandagatla <srinivas.kandagatla@...aro.org>
Cc: linux-arm-msm@...r.kernel.org, 
	Ekansh Gupta <quic_ekangupt@...cinc.com>, gregkh@...uxfoundation.org, quic_bkumar@...cinc.com, 
	linux-kernel@...r.kernel.org, quic_chennak@...cinc.com, dri-devel@...ts.freedesktop.org, 
	arnd@...db.de
Subject: Re: [PATCH v1 0/2] Add missing fixes in fastrpc_get_args

On Mon, Dec 30, 2024 at 04:15:42PM +0000, Srinivas Kandagatla wrote:
> 
> On Wed, 18 Dec 2024 15:54:27 +0530, Ekansh Gupta wrote:
> > This patch series adds the listed bug fixes that have been missing
> > in upstream fastRPC driver:
> > - Page address for registered buffer(with fd) is not calculated
> >   properly.
> > - Page size calculation for non-registered buffer(copy buffer) is
> >   incorrect.
> > 
> > [...]
> 
> Applied, thanks!

May I ask, why they are being accepted with the obvious checkpatch
warnings?

What kind of process is being followed, as those patches had review
comments to be implemented in the next iteration.

> 
> [1/2] misc: fastrpc: Fix registered buffer page address
>       commit: fa22a9743aece593fe9f1e0a0d6189a777d67e38
> [2/2] misc: fastrpc: Fix copy buffer page size
>       commit: 58570026c7ac249bfbd90f9fcb7d2e0a74a106a1
> 
> Best regards,
> -- 
> Srinivas Kandagatla <srinivas.kandagatla@...aro.org>
> 

-- 
With best wishes
Dmitry

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ